A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Everything old is new again: Binary security of {WebAssembly}

D Lehmann, J Kinder, M Pradel - 29th USENIX Security Symposium …, 2020 - usenix.org
WebAssembly is an increasingly popular compilation target designed to run code in
browsers and on other platforms safely and securely, by strictly separating code and data …

[Retracted] Mining Cryptocurrency‐Based Security Using Renewable Energy as Source

L Gundaboina, S Badotra, TK Bhatia… - Security and …, 2022 - Wiley Online Library
Cryptocurrency mining and blockchain technology using renewable energy as the main
electricity source has gained attention for sustainable development in financial areas …

An empirical study of real-world webassembly binaries: Security, languages, use cases

A Hilbig, D Lehmann, M Pradel - Proceedings of the web conference …, 2021 - dl.acm.org
WebAssembly has emerged as a low-level language for the web and beyond. Despite its
popularity in different domains, little is known about WebAssembly binaries that occur in the …

Cryptocurrencies as a subject of financial fraud

M Kutera - Journal of Entrepreneurship, Management and …, 2022 - ceeol.com
PURPOSE: The main purpose of this paper was to identify the current scope of research on
cryptocurrencies as a subject of fraud. Detailed research questions related to the …

ICLab: A global, longitudinal internet censorship measurement platform

AA Niaki, S Cho, Z Weinberg, NP Hoang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022 - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

A Kharraz, Z Ma, P Murley, C Lever, J Mason… - The World Wide Web …, 2019 - dl.acm.org
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …